Access Control Hardware

Software

Software is used to program a computerized access control system. Please visit our Software section for more information.

Server

A windows-based server is required to host an easy-to-use, reliable database. You can access the server with other workstations, webstations, and apps for iPhone, iPad, and Android devices.

Door Controller

All devices are wired back to the Door Controller and is the heart of an access control system. Each controller supports one to four proximity readers and controls doors, gates, and elevators. Usually mounted in an electrical or server room. Comes with a back-up battery in case of power outage.

I.P. Link

An I.P. Link module connects a door controller to your network via ethernet connection. Some models of door controller have a built-in I.P. Link such as a KT-1. Commonly used when managing multiple buildings or buildings with many floors.

Proximity Reader

Proximity readers constantly transmit a low level signal that provides energy to the card. When the card is held at predetermined distance from the reader, the signal is absorbed by a small coil inside the card and powers the card's micro-chip which contains a unique identification code. Once powered, the card transmits the code to the reader. The whole process is completed in microseconds. Interior or Exterior mounting as it has no openings to jam or tamper. Typical read ranges are between 4" and 29".

Proximity Card

Cards contain a micro-chip which contains a unique identification code. Once powered, the card transmits the code to the reader. Cards is very secure and difficult to replicate. Cards can be read through a purse or wallet and through most other non-metallic materials.

Proximity Keytag

Same technology as proximity cards. Fits on key ring.

Keypad

Keypads are often used at storage facility gates rather than distributing proximity cards. Uses 4 or 6 digit codes. Vandalproof and weatherproof. Backlit models available.

Biometric Readers

Fingerprint and Hand Readers prevent unauthorized access via lost or stolen proximity cards by requiring that the fingerprint or hand of the person requesting entry matches the identity of the cardholder. The reader stores thousands of templates, performs verification, and provides standard reader connection in XSF ioProx format (Extended Secure Format) or 26-bit Wiegand format.

Door Sensor

A Door Sensor is mounted on a door or gate and tells the controller if a door on the system is open or forced open. An alarm can be created in the software.

TREX Sensor

A TREX is a "Request to Exit" motion sensor mounted on the inside of a door and faces the door handle. When the TREX is activated the door strike or maglock releases the door. Request to exit sensors are important because they allow the controller permission to release a door without creating an alarm.

RTE Button

"Request To Exit" Button has the same function as TREX sensor, but you have to physically push the button to release the door.

Electric Strike

Usually installed by a locksmith or your door hardware supplier along with locking hardware. If you don't have a supplier we would be happy to co-ordinate this for you. The controller releases the strike when permission is granted.

Electromagnetic Lock

A Maglock uses upto 1500 pounds of holding force to keep a door locked. They should be used only when necessary as there are numerous regulations involving Fire Code and Building Code. Maglocks must release during a fire alarm.

Gate Control

Gates can be controlled the same way a door is controlled. Keypads or proximity readers are mounted on both sides of the gate for in/out access. This gate can also be opened with a remote control.

Elevator Control

You can control access to individual elevators and floors. In this application Reed Security eliminated several key-locks and an outdated swipe card system. The building manager administers the system.

Wireless Control

Requires a wireless receiver and wireless keys. Has a range of up to 80' with long range antenna. Used for gates and overhead doors.

Alarm Integration

Some clients prefer to eliminate using their alarm systems once they install an access control system. Swiping your proximity card or keytag can arm/disarm your alarm system.

Intercom Integration

We can use the same software we use for access control to program a telephone entry system. This is common for apartment buildings, condo's and office buildings.

Photo Id Printer

Add photo ID to your access control proximity card by adding a camera and photo ID printer. Prints directly onto the card. Design your own ID or use one of our templates. Also prints barcodes. Interfaces with your existing time and attendance system.

Testimonials

Reed Security provides us with excellent service. I would recommend Virgil and his friendly staff for any project because of their Knowledge, competitive pricing, and customer service.

- Colleen Mah, Northridge Development Corp.

We have had Reed Security at our branches and refer them to our clients.